Displaying 20 results from an estimated 1000 matches similar to: "[PATCH]: auth.c (pwcopy): Copy pw_gecos field when build for Cygwin"
2000 Oct 07
0
OpenSSH changes for BSD/OS
The following are patches against openssh 2.1.1p4 to add
support for the BSD_AUTH authentication mechanisms. It allows the
use of non-challenge/response style mechanisms (which styles are
allowed my be limited by appropriate auth-ssh entries in login.conf).
The patches also add support for calling setusercontext for the
appropriate class when called with a command (so that the PATH, limits,
2001 Jun 21
1
pw_expire/pw_change in current portable openssh CVS bombs
The references to pw_expire and pw_change in pwcopy() in misc.c cause
compilation errors at least on solaris. How about doing a memcpy of the
whole structure and only explicitly setting those that need xstrdup?
That would work on openbsd and everywhere else.
- Dave Dykstra
--- misc.c.O Thu Jun 21 11:35:28 2001
+++ misc.c Thu Jun 21 11:36:09 2001
@@ -125,14 +125,10 @@
{
struct passwd *copy =
2003 Dec 14
1
fakepw auth.c question
this is at the bottom of auth.c. What is it?
struct passwd *
fakepw(void)
{
static struct passwd fake;
memset(&fake, 0, sizeof(fake));
fake.pw_name = "NOUSER";
fake.pw_passwd =
"$2a$06$r3.juUaHZDlIbQaO2dS9FuYxL1W9M81R1Tc92PoSNmzvpEqLkLGrK";
fake.pw_gecos = "NOUSER";
fake.pw_uid = -1;
fake.pw_gid = -1;
fake.pw_class =
2002 Jun 25
0
[Bug 298] New: sshd fails to set user context, preventing all logins, also setgroups is failing
http://bugzilla.mindrot.org/show_bug.cgi?id=298
Summary: sshd fails to set user context, preventing all logins,
also setgroups is failing
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: BSDI
Status: NEW
Severity: major
Priority: P2
Component: sshd
2000 Feb 27
0
[PATCH] Fix login.conf, expiration, BSD compatibility in OpenSSH
This patch revive almost all login.conf and password/account expiration
features, makes OpenSSH more FreeBSD login compatible and fix non-critical
memory leak.
Please review and commit.
--- sshd.c.old Fri Feb 25 08:23:45 2000
+++ sshd.c Sun Feb 27 02:53:33 2000
@@ -37,9 +37,8 @@
#endif /* LIBWRAP */
#ifdef __FreeBSD__
-#include <libutil.h>
-#include <syslog.h>
#define LOGIN_CAP
2002 Mar 20
1
privsep
i think our strategy for privsep is to just keep portable sync'd closely
with openbsd's tree, even though things will be broken wrt privsep for
many platforms. then we just get primary one's working and work out
issues as we go along. i'll start to work on sun and hp-ux again
tomorrow.
2013 Apr 04
9
[Bug 2086] New: passwd struct does not have pw_gecos member on Android
https://bugzilla.mindrot.org/show_bug.cgi?id=2086
Bug ID: 2086
Summary: passwd struct does not have pw_gecos member on Android
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.2p1
Hardware: All
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: ssh
2003 May 19
0
[PATCH] getpwnam() implementation in tftpd.c
Hi,
This patch implements a minimal getpwnam() function in tftpd.c.
The reason for the patch is that I needed tftpd to work in my embedded
system, which are without libnss*. The patch has been tested, and works
for me. Please consider it.
Best regards,
jules
--
Jules Colding <JuBColding at yorkref.com>
York Refrigeration
diff -urN tftp-hpa-0.34.orig/tftpd/Makefile
2001 Jun 22
1
PATCH: pidfile/sigterm race
If one is using the pidfile as an indicator of sshd's status,
it is possible to kill sshd before the sigterm handler gets
installed, since the pidfile is written out before the signal
handlers are setup.
The solution is to simply write the pidfile after the signal
handlers are setup. Here's the patch.
Rob
--- sshd.c.orig Fri Jun 22 11:16:41 2001
+++ sshd.c Fri Jun 22 11:18:32 2001
@@
2007 Oct 20
5
[Bug 1377] New: getpwuid called twice without pwcopy (percent_expand: NULL replacement)
https://bugzilla.mindrot.org/show_bug.cgi?id=1377
Summary: getpwuid called twice without pwcopy (percent_expand:
NULL replacement)
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.4p1
Platform: ix86
OS/Version: Mac OS X
Status: NEW
Severity: major
Priority: P2
2018 Oct 04
2
vpopmail
Quoting Eric Broch <ebroch at whitehorsetc.com>:
> On 10/4/2018 7:27 AM, Rick Romero wrote:
>>
>> Quoting Eric Broch <ebroch at whitehorsetc.com
>> <mailto:ebroch at whitehorsetc.com>>:
>>
>>>
>>> On 10/4/2018 6:34 AM, Rick Romero wrote:
>>>>
>> Quoting Aki Tuomi <aki.tuomi at open-xchange.com
>>
2007 Feb 06
1
Problem with vpopmail auth
Hello,
I've install 1.021 and am having some problems getting vpopmail
authentication to work correctly (running 0.99 in production, upgrading
to 1.021). I'm using vpopmail-5.4.16. Here are the authentication
debug statements in the log, my dovecot.conf changes from default, and
the schema of my vpopmail database. Any ideas / suggestions? I've
commented out all authentication
2016 Dec 13
0
replication and backend vpopmail
Heloo, please
I need "replicate" dovecot / dsync.
Prerequisite:
doveadm user '*'
[Root @ joe ~] # doveadm user '' '
Error: User listing Returned failure
Fatal: user listing failed
It probably does not work because I have:
userdb{
args = cache_key =% u quota_template quota_rule = = *: backend = q%
driver = vpopmail
}
The manual is written:
iterate_query
2008 Jan 23
0
strange issues with pam_winbind and sudo
I have two issues, potentially related, potentially not. First
off, a bit about my environment:
I am experiencing the same issues on two boxes, one of which is
running red hat linux ES 4 update 6 i386, the other running red hat
enterprise linux server release 5.1 x86_64 . Both appear to be
running samba 3.0.25b, both are members of an active directory
domain . There are 7 domain controllers in
2018 Oct 04
0
vpopmail
On 10/4/2018 7:27 AM, Rick Romero wrote:
>
> Quoting Eric Broch <ebroch at whitehorsetc.com
> <mailto:ebroch at whitehorsetc.com>>:
>
>>
>> On 10/4/2018 6:34 AM, Rick Romero wrote:
>>>
> Quoting Aki Tuomi <aki.tuomi at open-xchange.com
> <mailto:aki.tuomi at open-xchange.com>>:
>
>> On 03.10.2018 23:30, Eric Broch wrote:
2018 Oct 04
0
vpopmail
Quoting Rick Romero <rick at havokmon.com>:
> Quoting Eric Broch <ebroch at whitehorsetc.com>:
>
>> On 10/4/2018 7:27 AM, Rick Romero wrote:
>>> Quoting Eric Broch <ebroch at whitehorsetc.com
>>> <mailto:ebroch at whitehorsetc.com>>:
>>>
>>>> On 10/4/2018 6:34 AM, Rick Romero wrote:
>>>>> ?
>>>
2001 Jun 18
2
Patch for changing expired passwords
The primary purpose of the attached patches is for portable OpenSSH to
support changing expired passwords as specified in shadow password files.
To support that, I did a couple enhancements to the base OpenBSD OpenSSH
code. They are:
1. Consolidated the handling of "forced_command" into a do_exec()
function in session.c. These were being handled inconsistently and
allocated
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
Hi All.
Attached is a patch which adds AIX native password expiry support to
sshd. It will only apply to -current and is a subset of the patch I have
been working on in the last few months (see bug #14 [1]). It contains
code by Pablo Sor, Mark Pitt and Zdenek Tlusty and fixes for bugs reported
by many others (see [2] for a full list).
It adds a do_tty_change_password function that execs
2020 Mar 18
2
Headsup on feature removal
Hi Aki and Remo,
switch from vpopmail driver to SQL driver (if you are using vpopmail
with mysql as backend) is very simple.
First you need to setup the right query for vpopmail database:
# cat /etc/dovecot/dovecot-sql.conf.ext
### Vpopmail
driver = mysql
connect = host=192.168.1.2 dbname=vpopmail user=vpopmail password=Vp0pM4iL
default_pass_scheme = MD5-CRYPT
### Query to get a list of all
2003 Jul 30
1
[PATCH] Password expiry merge (AIX parts)
Hi All.
Attached is a patch introduces password expiry handling for AIX (other
platforms to follow). It is more or less the same as the previous patch
but has been updated to reflect recent changes to auth-passwd.c
I'm wondering if the AIX parts of auth.c should be moved to port-aix.c
and if the generic password change functions (currently at the end of
auth-passwd.c) belong in a separate